Vulnerabilities (CVE)

Filtered by vendor Ibm Subscribe
Filtered by product Doors Next
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-4297 1 Ibm 2 Doors Next, Rational Doors Next Generation 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176474.
CVE-2020-4295 1 Ibm 2 Doors Next, Rational Doors Next Generation 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176408.
CVE-2020-4281 1 Ibm 2 Doors Next, Rational Doors Next Generation 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176141.
CVE-2019-4748 1 Ibm 10 Collaborative Lifecycle Management, Doors Next, Engineering Lifecycle Manager and 7 more 2024-11-21 3.5 LOW 5.4 MEDIUM
IBM Jazz Team Server based Applications are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 173174.
CVE-2023-45192 1 Ibm 1 Doors Next 2024-10-08 N/A 8.2 HIGH
IBM Engineering Requirements Management DOORS Next 7.0.2 and 7.0.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 268758.